|
|
|||
|
||||
OverviewThis two-volume set, LNICST 685 and 686, constitutes the refereed post-conference proceedings of the 16th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2025, Miami, FL, USA, during November 17–19, 2025. The 66 full papers and 1 poster paper included in these volumes were carefully reviewed and selected from 163 submissions. They have been organized in the following topical sections: Part I: AI and Machine Learning in Digital Forensics: Papers applying AI, LLMs, and deep learning to detect anomalies,enhance forensics, or improve model reliability; Digital Forensics and Incident Response: Focused on forensic investigation, evidence recovery, data analysis, and structured workflows; Adversarial Machine Learning and Attack Detection: Addressing adversarial AI, attack simulation, and defensive mechanisms; and Cyber Threat Intelligence and Malware Analysis: Focus on malware detection, honeynets, phishing, traffic analysis, and intrusion defense. Part II: Cyber Threat Intelligence and Malware Analysis: Focus on malware detection, honeynets, phishing, traffic analysis, and intrusion defense; Digital Evidence Management, Blockchain, and Privacy: Addressing blockchain forensics, data provenance, and privacy-preserving computation; Critical Infrastructure and Cyber-Physical Security: Cyber resilience in physical and industrial systems, including IoT, satellites, and SCADA; Legal, Policy, and AI Governance in Digital Forensics: Studies bridging AI governance, digital law, compliance, and socio-technical policy; and Posters & Demos. Full Product DetailsAuthor: Kim-Kwang Raymond Choo , Alexander Perez-Pons , Himanshu Upadhyay , Rongxing LuPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032225443ISBN 10: 3032225442 Pages: 584 Publication Date: 03 June 2026 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Cyber Threat Intelligence and Malware Analysis: Focus on malware detection, honeynets, phishing, traffic analysis, and intrusion defense. .- An encrypted traffic classification method based on Mamba and wavelet transform convolution. .- MFETD: Multimodal Feature Fusion for Encrypted Traffic Detection based on Transformer. .- Online Learning for Android Malware Detection under Concept-Drift. .- Evaluating the Impact of Honeynets on Malicious Activity in Home Network Environments. .- Revealing the Intents: Malware Protocol Semantic Inference using Large Language Models. .- PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation. .- APT-Agent: A Training-Free, Unsupervised, LLM-Based Multi-Agent Framework for Interpretable Advanced Persistent Threat Detection. .- Digital Evidence Management, Blockchain, and Privacy: Addressing blockchain forensics, data provenance, and privacy-preserving computation. .- Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis. .- FAIR-MPC:Secure and Auditable SMPC for Anonymous Financial Collaboration. .- Privacy-Preserving k-Bitruss Community Query over Encrypted Bipartite Graphs. .- Towards Regulated and Accountable Privacy-Preserving Retrieval for Digital Forensics: A Cryptographic Design Framework. .- Automatic Recovery of Cryptowallets from Mnemonic Seed Phrases. .- AnchorMark: Real-World Anchor-Based Watermarking for Digital Content Authentication and Manipulation Detection. .- Critical Infrastructure and Cyber-Physical Security: Cyber resilience in physical and industrial systems, including IoT,satellites, and SCADA. .- Resilient Satellite Cybersecurity: Integrating NIST and AI Governance. .- An Enhanced Federated Machine Learning Approach for Decentralized Water Contamination Detection. .- DepFieldGen: Research on Dependent Field Generation for Secure ICS Protocols. .- A ROSI-Based Framework with Zero Trust Architecture: Interdependent Risks and Cybersecurity Investment. .- Accelerating Criminal Investigations with TRACY. .- Legal, Policy, and AI Governance in Digital Forensics:Studies bridging AI governance, digital law, compliance, and socio-technical policy. .- Retrospective Analysis of Legal Documents Using Hybrid AI - A Preliminary Empirical Study of Historical Search Warrant Processing. .- Where the Money Is: Shadow AI Risks to Family Offices and the Wealth Management Sector. .- Chances and Challenges of the Model Context Protocol in Digital Forensics and Incident Response. .- SCOPE - Activity Recognition Using Temporally Dominant Topic Identification In Forensic Chat Analysis. .- Automating Cloud Security and Forensics Through a Secure-by-Design GenAI Framework. .- Understanding Online Grooming Through LLMs: Stage Detection and Linguistic Patterns. .- Emerging Research, Tools, and Experimental Frameworks: Novel methods, datasets, and future directions in digital forensics and cybersecurity. .- Graph Neural Networks for Video Device Identification. .- WebHunter: An LLM-Agent with Exploit Planning and Tool Collaboration for Automated SQL Injection. .- AFLTrans: An Intelligent Generative Fuzz Testing Method for Binary Programs Based on Transformer. .- HLSEn: High-level Semantic Awareness Pseudo-code Encoding for Binary Code Similarity Detection. .- SolDataVul-LLaMA Dataset: a LLM-driven construction method and detection research of smart contract vulnerability dataset in data trading scenarios. .- The sample classification method accelerates the efficiency of robustness verification. .- MuLImg-SCV: Multi-Label Vulnerability Classification of Smart Contracts Based on RGB Image. .- On the Security of the RDHEI by Binary Symmetric Channel and Polar Code. .- Posters & Demos. .- Enhancing Trust in VideoKYC: Deepfake Detection and Source Attribution.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||